Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

IIBA-CCA Certificate in Cybersecurity Analysis (CCA) Questions and Answers

Questions 4

What is the purpose of Digital Rights Management DRM?

Options:

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Buy Now
Questions 5

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

Options:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.

Buy Now
Questions 6

Which organizational area would drive a cybersecurity infrastructure Business Case?

Options:

A.

Risk

B.

IT

C.

Legal

D.

Finance

Buy Now
Questions 7

Which statement is true about a data warehouse?

Options:

A.

Data stored in a data warehouse is used for analytical purposes, not operational tasks

B.

The data warehouse must use the same data structures as production systems

C.

Data warehouses should act as a central repository for the data generated by all operational systems

D.

Data cleaning must be done on operational systems before the data is transferred to a data warehouse

Buy Now
Questions 8

Where SaaS is the delivery of a software service, what service does PaaS provide?

Options:

A.

Load Balancers

B.

Storage

C.

Subscriptions

D.

Operating System

Buy Now
Questions 9

Separation of duties, as a security principle, is intended to:

Options:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

Buy Now
Questions 10

Why is directory management important for cybersecurity?

Options:

A.

It prevents outside agents from viewing confidential company information

B.

It allows all application security to be managed through a single interface

C.

It prevents outsiders from knowing personal information about employees

D.

It controls access to folders and files on the network

Buy Now
Questions 11

What should organizations do with Key Risk Indicator KRI and Key Performance Indicator KPI data to facilitate decision making, and improve performance and accountability?

Options:

A.

Achieve, reset, and evaluate

B.

Collect, analyze, and report

C.

Prioritize, falsify, and report

D.

Challenge, compare, and revise

Buy Now
Questions 12

A significant benefit of role-based access is that it:

Options:

A.

simplifies the assignment of correct access levels to a user based on the work they will perform.

B.

makes it easier to audit and verify data access.

C.

ensures that employee accounts will be shut down on departure or role change.

D.

ensures that tasks and associated privileges for a specific business process are disseminated among multiple users.

Buy Now
Questions 13

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

Options:

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

Buy Now
Questions 14

What is whitelisting in the context of network security?

Options:

A.

Grouping assets together based on common security requirements, and placing each group into an isolated network zone

B.

Denying access to applications that have been determined to be malicious

C.

Explicitly allowing identified people, groups, or services access to a particular privilege, service, or recognition

D.

Running software to identify any malware present on a computer system

Buy Now
Questions 15

What is risk mitigation?

Options:

A.

Reducing the risk by implementing one or more countermeasures

B.

Purchasing insurance against a cybersecurity breach

C.

Eliminating the risk by stopping the activity which causes risk

D.

Documenting the risk in full and preparing a recovery plan

Buy Now
Questions 16

What is an external audit?

Options:

A.

A review of security-related measures in place intended to identify possible vulnerabilities

B.

A process that the cybersecurity follows to ensure that they have implemented the proper controls

C.

A review of security expenditures by an independent party

D.

A review of security-related activities by an independent party to ensure compliance

Buy Now
Questions 17

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

Options:

A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

Buy Now
Questions 18

What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?

Options:

A.

Access Control List

B.

Access Control Entry

C.

Relational Access Database

D.

Directory Management System

Buy Now
Questions 19

Which of the following would qualify as a multi-factor authentication pair?

Options:

A.

Thumbprint and Encryption

B.

Something You Know and Something You Are

C.

Password and Token

D.

Encryption and Password

Buy Now
Questions 20

Which of the following factors is most important in determining the classification of personal information?

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Accessibility

Buy Now
Questions 21

There are three states in which data can exist:

Options:

A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

Buy Now
Questions 22

Which of the following terms represents an accidental exploitation of a vulnerability?

Options:

A.

Threat

B.

Agent

C.

Event

D.

Response

Buy Now
Exam Code: IIBA-CCA
Exam Name: Certificate in Cybersecurity Analysis (CCA)
Last Update: Feb 18, 2026
Questions: 75

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now IIBA-CCA testing engine

PDF (Q&A)

$43.57  $124.49
buy now IIBA-CCA pdf